Security & DevSecOps
Former CISSP

Security built in,
not bolted on

Former CISSP developer who understands security from the code level up. Secure code review, application hardening, and DevSecOps practices that don't slow you down.

Security from a developer's perspective

I'm a developer first, with deep security expertise. Having held my CISSP certification from 2001-2010, I understand security frameworks and risk management—but my real strength is knowing how vulnerabilities are actually introduced in code and how to prevent them at the source.

This isn't about compliance checkboxes. It's about building software that's secure by design, with security integrated into your development workflow rather than tacked on at the end.

Security services

Practical security for development teams

Secure code review

Manual code review focused on security vulnerabilities. I find what automated tools miss.

  • OWASP Top 10 vulnerability assessment
  • Authentication & authorization flaws
  • Input validation & sanitization
  • SQL injection & XSS prevention
  • Secrets management review

Application hardening

Strengthen your application's defenses. Security headers, CSP policies, and configuration hardening.

  • Security headers implementation
  • Content Security Policy (CSP)
  • HTTPS/TLS configuration
  • Session security
  • Rate limiting & abuse prevention

DevSecOps integration

Security in your CI/CD pipeline. Automated scanning, dependency checks, and security gates that don't block velocity.

  • SAST integration (static analysis)
  • Dependency vulnerability scanning
  • Container image scanning
  • Secret detection in code
  • Security-focused PR reviews

Developer security training

Practical security training for development teams. Real vulnerabilities, real code, real fixes.

  • Secure coding workshops
  • OWASP awareness training
  • PHP/Laravel security specifics
  • Security mindset development
  • Hands-on vulnerability exercises

Infrastructure security

Server hardening and infrastructure security. Secure configurations for Linux servers and cloud environments.

  • Linux server hardening
  • Firewall configuration
  • SSH hardening & key management
  • Database security
  • Security logging & monitoring

Compliance support

Technical support for security compliance. Help implementing controls required by ISO 27001, SOC2, and NIS2.

  • Technical control implementation
  • Security documentation support
  • Audit evidence preparation
  • Gap assessment (technical)
  • Remediation implementation

CISSP knowledge domains

Former CISSP with knowledge across all eight domains of information security

Security & Risk
Management
Asset
Security
Security
Architecture
Communication
& Network Security
IAM
Identity & Access
Assessment
& Testing
Security
Operations
Software
Development Security

Security-focused experience

While my primary background is in software development and DevOps, I have deep experience in application security. My former CISSP certification (2001-2010) represents my commitment to this discipline.

I'm particularly interested in roles that combine development expertise with security responsibilities—Security Engineer, Application Security Specialist, or DevSecOps positions where understanding both the code and the security landscape is valuable.

If you're looking for someone who can bridge the gap between development teams and security requirements, let's talk.

Ready to secure your application?

Let's discuss how to integrate security into your development process.

Schedule a security discussion